Sciweavers

2131 search results - page 246 / 427
» Multi-Agent System Development: Design, Runtime, and Analysi...
Sort
View
MSR
2006
ACM
15 years 10 months ago
Tracking defect warnings across versions
Various static analysis tools will analyze a software artifact in order to identify potential defects, such as misused APIs, race conditions and deadlocks, and security vulnerabil...
Jaime Spacco, David Hovemeyer, William Pugh
VEE
2012
ACM
238views Virtualization» more  VEE 2012»
13 years 11 months ago
Replacement attacks against VM-protected applications
Process-level virtualization is increasingly being used to enhance the security of software applications from reverse engineering and unauthorized modification (called software p...
Sudeep Ghosh, Jason Hiser, Jack W. Davidson
IPPS
2007
IEEE
15 years 10 months ago
An Adaptive Semantic Filter for Blue Gene/L Failure Log Analysis
— Frequent failure occurrences are becoming a serious concern to the community of high-end computing, especially when the applications and the underlying systems rapidly grow in ...
Yinglung Liang, Yanyong Zhang, Hui Xiong, Ramendra...
BMCBI
2010
124views more  BMCBI 2010»
15 years 4 months ago
GPFrontend and GPGraphics: graphical analysis tools for genetic association studies
Background: Most software packages for whole genome association studies are non-graphical, purely text based programs originally designed to run with UNIX-like operating systems. ...
Steffen Uebe, Francesca Pasutto, Mandy Krumbiegel,...
ESORICS
2009
Springer
16 years 4 months ago
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Automatic protocol reverse engineering has recently received significant attention due to its importance to many security applications. However, previous methods are all limited in...
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang,...